Introduction to Exploit Development
This course will introduce students to the art and science of exploit development. Core concepts involving debuggers, stack based overflows, disassemblers and some defence mitigation will be taught in a largely practical delivery style. Instruction will commence with an overview of foundational theory concepts, and will then quickly dive into the intricacies of modern x86 CPUs. Mitigations such as DEP and ASLR will be investigated, and students will have the opportunity to demonstrate their new skills in an extended capstone exercise on the final day.
Note: this course is a foundational course and will not teach 64 bit exploitation or advanced protection bypass techniques.
Duration: 5 days
Delivery Mode: Classroom
In-house: Contact the Professional Education Course Unit for more information and to arrange a quote. Recommended for groups of 10 or more.
What you will receive:
- Access to the full version of IDA Pro for the duration of the course.
- Comprehensive set of course notes.
- Certificate of attendance.
- Morning tea, lunch and afternoon tea.
Affiliated course: Advanced Exploit Development (5 days)
- Novice exploit developers
- Software architects
- Core exploitation theory
- Stack based overflows on Linux and Windows
- Heap overflows (limited scope)
- Tool use
- Shellcode generation and modification
- Introduction to mitigations
- Mitigation bypass (limited scope)
- Capstone practical exercise
UNSW CANBERRA CYBER
UNSW Canberra Cyber is a focal point for the research of some 60 scholars from various faculties across UNSW who conduct research work on different aspects of cyber security. The Centre is based in Canberra at the Defence Force Academy that provides both advanced research as well as undergraduate and graduate education on cyber security. UNSW Canberra Cyber brings together the biggest concentration of research and tertiary education for the multi-disciplinary study of cyber security in any single university in the Southern hemisphere. A number of UNSW Canberra Cyber scholars, in areas ranging from information technology and engineering to law and politics, have significant international reputations for their work.
email@example.com W: www.unsw.adfa.edu.au/unsw-canberra-cyber
No dates? Or unable to attend dates shown? Submit an Expression of Interest below to be notified of upcoming courses.